Atomic Runbook: Get File Hash Threat Intel via SecOps MCP#
ID: RB-ATOM-HASH-002
Version: 1.0
Last_Updated: 2025-05-30
Purpose: To retrieve general threat intelligence about a file hash using the Chronicle secops-mcp get_threat_intel tool. This serves as a supplementary check for narrative context or an alternative if specialized tools yield no results.
Parent_Runbook(s)/Protocol(s): rules-bank/indicator_handling_protocols.md#3-atomic-indicator-file-hash, rb_hash_get_gti_report.md (as potential next step)
Trigger: When a file hash requires external threat intelligence, possibly after a GTI check, or if broader textual context is needed.
Inputs Required#
file_hash: string - The file hash (MD5, SHA1, or SHA256) to query.Source Example: Alert data, output from other tools.
gti_confidence(optional): string - Confidence from a preceding GTI check (e.g., “Unknown_Reputation_GTI”).
Execution Steps#
Tool Selection:
Primary_Tool_MCP_Server:
secops-mcpPrimary_Tool_Name:
get_threat_intel
Parameter Mapping:
Construct query:
query: “Provide threat intelligence summary for file hash {file_hash}”
Execute Tool: Call
get_threat_intelwith thequery.AI Agent Note: Refer to
rules-bank/mcp_tool_best_practices.md.
Data Transformation/Extraction:
Output is textual. AI may parse for keywords.
Outputs Expected#
secops_ti_summary: string - Textual threat intelligence summary.identified_keywords: list (optional) - Keywords extracted by AI (e.g., “malware”, “dropper”, “benign utility”).output_status: string - [“Success”, “Failure”]output_message: string (if Failure).
Decision Logic / Next Steps (If Applicable)#
IF
output_statusis “Success”:IF
secops_ti_summarycontains “known malicious”, “malware family”, “trojan” THENFlag Hash as “High_Risk_SecOpsTI”.
Proceed to
rb_hash_lookup_entity_chronicle.md.
ELSE IF
secops_ti_summarycontains “suspicious”, “hacktool”, “PUA” OR (gti_confidencewas “Unknown_Reputation_GTI” AND summary is not explicitly benign) THENFlag Hash as “Medium_Risk_SecOpsTI_Needs_Correlation”.
Proceed to
rb_hash_lookup_entity_chronicle.md.
ELSE
Flag Hash as “Low_Risk_SecOpsTI” (or “Info_Only_SecOpsTI”).
Proceed to
rb_hash_lookup_entity_chronicle.md.
ELSE (
output_statusis “Failure”):Log error:
output_message.Escalate: “Failed to retrieve SecOps threat intelligence for file hash {file_hash}.”
AI Agent Execution Notes#
AI should perform NLP on
secops_ti_summaryforidentified_keywords.Context from
gti_confidenceshould inform interpretation.
Metrics Collection Points#
Log execution time.
Log
output_status.(Reference
rules-bank/ai_performance_logging_requirements.md)
References#
rules-bank/mcp_tool_best_practices.mdrules-bank/indicator_handling_protocols.mdrules-bank/ai_performance_logging_requirements.md